Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      How Polymarket Is Turning Bitcoin Volatility Into a Five-Minute Betting Market

      February 13, 2026

      Israel Indicts Two Over Secret Bets on Military Operations via Polymarket

      February 13, 2026

      Binance’s October 10 Defense at Consensus Hong Kong Falls Flat

      February 13, 2026

      Argentina Congress Strips Workers’ Right to Choose Digital Wallet Deposits

      February 13, 2026

      Monero Price Breakdown Begins? Dip Buyers Now Fight XMR’s Drop to $135

      February 13, 2026
    • Technology

      Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

      February 13, 2026

      “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

      February 13, 2026

      Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

      February 13, 2026

      Haru Mini retro camera takes on Kodak Charmera with a 20MP sensor in tiny retro SLR body

      February 13, 2026

      Under $8: Fantasy-themed strategy RPG reaches new all-time low on Steam

      February 13, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
    Technology

    Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks

    TechAiVerseBy TechAiVerseJune 26, 2025No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks

    A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft’s ClickOnce software deployment tool and custom Golang backdoors to compromise organizations within the energy, oil, and gas sectors.

    The hackers rely on legitimate AWS cloud services (AWS, Cloudfront, API Gateway, Lambda) to keep the command and control (C2) infrastructure hidden.

    ClickOnce is a deployment technology from Microsoft that allows developers to create self-updating Windows-based applications, reducing user interaction to a minimum.

    Security researchers at cybersecurity company Trellix analyzed three variants of the campaign (v1a, BPI-MDM, and v1d), all of them deploying “a sophisticated Golanguage backdoor” called RunnerBeacon via a .NET-based loader tracked as OneClikNet.

    According to them, each version of the OneClik campaign evolved with advanced tactics and C2 obfuscation, robust anti-analysis, and sandbox evasion techniques.

    While operational indicators point to China-affiliated threat actors, the researchers are cautious in making an attribution.

    Abusing Microsoft’s ClickOnce deployment tool

    OneClik attacks combine legitimate tools with custom malware and cloud and enterprise tooling, which allows the threat actor to evade detection of the operation.

    It starts with a phishing email with a link to a fake hardware analysis site hosted in the Azure ecosystem that delivers a .APPLICATION file (ClickOnce manifest) disguised as a legitimate tool.

    Trellix researchers say that the attacker used ClickOnce apps as a delivery mechanism for malicious payloads without triggering the user account control mechanism.

    “ClickOnce apps launch under the Deployment Service (dfsvc.exe), enabling attackers to proxy execution of malicious payloads through this trusted host.

    Because ClickOnce applications run with user-level privileges (no user account control required), they offer an appealing delivery mechanism for threat actors aiming to avoid privilege escalation,” the researchers explain.

    Infection chain in OneClik attacks
    source: Trellix

    After execution, the ClickOnce loader runs malicious payloads by hijacking how the .NET application loads assemblies, a technique called AppDomainManager injection.

    In the case of OneClik, this allowed the threat actor to use a legitimate .NET executable, such as ZSATray.exe, umt.exe, or ied.exe, to load something else than the normal dependencies.

    “With the loader in place, payload execution proceeds under dfsvc.exe, blending with benign ClickOnce activities,” Trellix researchers say.

    To conceal the operation for a longer period, the threat actor leveraged legitimate AWS services, which made C2 communication appear as normal cloud usage as it mixed with harmless CDN traffic.

    In the OneClik v1a variant, the beacon contacted a Cloudfront distribution domain and an API Gateway endpoint. In the v1d it used an AWS Lambda function URL as the HTTP callback address.

    “By “hiding in the cloud,” attackers exploit the high trust and availability of AWS: defenders must decrypt SSL or denylist entire AWS domains to notice this traffic, which is often impractical,” Trellix researchers clarify.

    Go-based RunnerBeacon backdoor

    An analysis of the Golang-based RunnerBeacon backdoor showed that its C2 protocol encrypted all traffic using the RC4 stream cipher algorithm and serialized data using MessagePack.

    It features a modular message protocol with multiple message types, among them BeaconData, FileRequest, CommandRequest, SOCKSRequest, and FileUpload.

    Some of the methods the backdoor uses to hinder analysis, the researchers found an “obfuscate_and_sleep” routine and randomized “jitter” in beacon intervals.

    The researchers also observed high-level commands that allow the threat actor to:

    • execute shell commands (CreateProcessW)
    • numerate processes
    • run file operations (directory listing, upload, download)
    • carry out network-related tasks (port scanning)
    • establish a SOCKS5 tunnel to proxy data traffic

    Additional RunnerBeacon capabilities include advanced operations like process injection and setting the stage for privilege escalation.

    Trellix says that RunnerBeacon’s design is similar to known Go-based Cobalt Strike beacons like those in the Geacon family.

    Due to the similarities in the set of commands and the use of cross-protocol C2, they say that “RunnerBeacon may be an evolved fork or privately modified variant of Geacon, tailored for stealthier, and cloud-friendly operations”

    Cautious attribution

    Although the OneClik campaign was discovered recently, at the beginning of March, a variant of the RunnerBeacon loader was identified in September 2023 at a company in the Middle East in the oil and gas sector.

    The delivery method could not be determined but the variant’s code is almost identical to the analyzed module from the OneClik operation.

    The clues pointing to activity related to a China-affiliated state actor include tactics, techniques, and procedures seen in other campaigns attributed to Chinese threat actors.

    Trellix highlights that the .NET AppDomainManager injection technique has been used in multiple cyberattacks attributed to Chinese threat actors. The same goes for the method used to deploy the encrypted payload.

    Additionally, previous China-linked campaigns show a preference for cloud-based staging using services from Alibaba and Amazon.

    However, these overlaps are not enough to attribute the OneClik attacks to a specific threat actor.

    The report from Trellix includes a comprehensive list of indicators of compromise for all components in the OneClik campaign, ranging from phishing lures and malware loaders to configuration files, backdoor binaries, legitimate executables, domains, and configuration parameters.


    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleNew wave of ‘fake interviews’ use 35 npm packages to spread malware
    Next Article Hackers turn ScreenConnect into malware using Authenticode stuffing
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    February 13, 2026

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    February 13, 2026

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    February 13, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025669 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025258 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025153 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 13, 2026

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier – NotebookCheck.net…

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    Haru Mini retro camera takes on Kodak Charmera with a 20MP sensor in tiny retro SLR body

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    February 13, 20263 Views

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    February 13, 20263 Views

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    February 13, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.